New Arrivals/Restock

Mastering Container Security: Hardening Podman, Rootless Docker, and Linux Containers for Modern DevSecOps

flash sale iconLimited Time Sale
Until the end
09
30
03

$14.29 cheaper than the new price!!

Free shipping for purchases over $99 ( Details )
Free cash-on-delivery fees for purchases over $99
Please note that the sales price and tax displayed may differ between online and in-store. Also, the product may be out of stock in-store.
New  $23.82
quantity

Product details

Management number 220490955 Release Date 2026/05/03 List Price $9.53 Model Number 220490955
Category

Secure Containers. Verify Supply Chains. Enforce Zero-Trust — This Is the New Era of Container Security.Containers run the world’s infrastructure — but most are still deployed with default privileges, insecure images, and weak runtime visibility. Mastering Container Security rewrites that playbook with a complete, practical guide to hardening Podman, Rootless Docker, and modern Linux container stacks for real-world DevSecOps environments.Built for 2025 and beyond, this book bridges security engineering, cloud-native architecture, and hands-on DevOps practice. You’ll move from understanding the threat landscape to building fully rootless, signed, monitored, and policy-driven container platforms using today’s most advanced open-source tools.Inside You’ll Learn How ToBuild rootless Podman and Docker containers with secure user namespaces, UID mapping, and kernel isolation.Apply CIS Benchmarks, NIST SP 800-190, and MITRE ATT&CK mappings to real-world container environments.Harden hosts with Seccomp, AppArmor, SELinux, and No New Privileges (NNP).Generate and sign SBOMs with Syft, Trivy, and cosign, then enforce image integrity in Harbor and GitHub Actions pipelines.Detect runtime threats with Falco and Tetragon, using eBPF-based auditing for privilege escalation and container escapes.Automate security controls across CI/CD pipelines with Jenkins, Drone CI, and OPA policy gates.Integrate Zero-Trust principles, workload attestation, and TPM-based verification for next-gen confidential computing.Each chapter ends with a Practice Lab, ensuring you build, test, and verify every technique — culminating in a full-stack DevSecOps project that deploys a signed, monitored, and policy-enforced container platform from scratch.Who This Book Is ForDevSecOps Engineers securing containers in regulated or high-trust environments.System Administrators and SREs building hardened rootless infrastructures.Cloud-Native Developers embedding security into the build and deploy pipeline.Security Analysts seeking real-time detection and response visibility at the container level.Modern, Hands-On, and Enterprise-ReadyEvery configuration, command, and YAML example in this book has been tested on Podman, Docker, and Linux distributions (Fedora, Ubuntu, RHEL, Rocky Linux) — ensuring reproducibility in both enterprise clusters and homelab environments.From image signing and policy enforcement to eBPF-driven runtime defense, this book delivers the complete blueprint for container security maturity in the age of rootless and trustless DevOps.Protect your containers. Prove your trust. Automate your defense.Start mastering modern container security today. Read more

ISBN13 979-8270624248
Language English
Publisher Independently published
Dimensions 8.5 x 1.08 x 11 inches
Item Weight 2.43 pounds
Print length 478 pages
Publication date October 19, 2025

Correction of product information

If you notice any omissions or errors in the product information on this page, please use the correction request form below.

Correction Request Form

Product Review

You must be logged in to post a review